Author:
Jansen Jurjen,van Schaik Paul
Abstract
Purpose
The purpose of this paper is to compare three social cognitive models in their ability to explain intentions of precautionary online behaviour. The models are: protection motivation theory (PMT), the reasoned action approach (RAA) and an integrated model comprising variables of these models.
Design/methodology/approach
Data were collected from 1,200 Dutch users of online banking by means of an online survey and analysed using partial least squares path modelling method.
Findings
The two models equally explain about much of the variance in precautionary online behaviour; in the integrated model, the significant predictors of the two models remained significant. Precautionary online behaviour is largely driven by response efficacy, attitude towards behaviour and self-efficacy.
Research limitations/implications
One limitation is that the predictor variables – “self-efficacy” and “attitude” – are represented by one item only in the path-analysis because of high cross-loadings of the other items with the dependent variable.
Practical implications
The results give practitioners a potentially wider range of options to design preventative measures.
Originality/value
The three models are successfully applied to online banking. This paper concludes that both PMT and RAA make a unique contribution in explaining variance for precautionary online behaviour. This paper is a re-publication of a previous conference paper (Jansen and van Schaik, 2016).
Subject
Management of Technology and Innovation,Information Systems and Management,Computer Networks and Communications,Information Systems,Software,Management Information Systems
Reference66 articles.
1. Exploring teenagers’ adaptive and maladaptive thinking in relation to the threat of HIV infection;Psychology & Health,1994
2. The theory of planned behavior;Organizational Behavior and Human Decision Processes,1991
3. Key drivers of internet banking services use;Online Information Review,2009
4. Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions;MIS Quarterly,2010
5. Anderson, R. (2007), “Closing the phishing hole: fraud, risk and nonbanks”, Proceedings of the Payments System Research Conferences, available at: www.kansascityfed.org/publicat/pscp/2007/pdf/Anderson.pdf (accessed October 27 2016).
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献